PII De-Identification techniques

Types of (PII) de-identification techniques Choosing the de-identification transformation you want to use depends on the kind of data you want to de-identify and for what purpose you’re de-identifying the data. The de-identification techniques that Sensitive Data Protection supports fall into the following general categories: Redaction: Deletes all or part of a detected sensitive value. Replacement: Replaces a detected sensitive value with a specified surrogate value. Masking: Replaces a number of characters of a sensitive value with a specified surrogate character, such as a hash (#) or asterisk (*)....